Hackers turn to online games to target victims
Scammers and hackers are increasingly using online games to trick victims into installing malicious software onto computers, warns security firm BitDefender.

Scammers and hackers are increasingly using online games to trick victims into installing malicious software onto computers, warns security firm BitDefender.
Your exclusive guide to CIO trends
A collection of our most popular articles for IT leaders from the first few months of 2016, including: - Corporate giants recruit digitally-minded outsiders to drive transformation - Analytics platforms to drive strategy in 2016 - Next generation: The changing role of IT leaders.
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.
Children are the most obvious target of this tactic, with simple games like "spot the differences" between two similar images being laced with botnet infections and malware targeting financial data.
The problem is only set to grow, said BitDefender, with a recent online survey revealing that around 47% of children in the UK and the US have their own social network accounts and a quarter of parents do not monitor their children's online activity.
In the past week, BitDefender researchers have discovered more than half a dozen samples of games rigged with Trojans that could steer children to web pages that install malicious software potentially capable of stealing financial information or injecting spyware onto the machines.
Cybercriminals are also targeting children through sites with educational and entertaining materials, including a site for "adopting" and growing virtual pets. In all cases, researchers found the malicious code was planted on legitimate, high-traffic websites.
BitDefender recommends giving children access to only limited user accounts that will prevent them from installing applications, modifying critical system settings or deleting system files that might damage the operating system.
This type of attack is emerging as a growing number of business organisations allow employees to use their own computer devices at work.
A global study of 700 CIOs, commissioned by Citrix, has revealed that 94% of organisations are planning to allow staff to bring their own devices to work by 2013.
In the UK, organisations are more likely than other countries surveyed to trial bring your own device (BYOD) schemes, with 33% intending to do this within the next 12 months.
CW+
Features
Enjoy the benefits of CW+ membership, learn more and join.
Read more on IT risk management
-
Security Think Tank: Five tips for creating a patch management strategy
-
Security Think Tank: Security patching an essential element of outsourcing contracts
-
Security Think Tank: Allocate maintenance processes to each piece of key software
-
Security Think Tank: Using vulnerability management to support the patching process
-
Lancaster and Newcastle researchers tackle Met Police email challenge
-
InfoSec Europe 2012: A look at IT security skills in the current climate
-
Tim Wilson, deputy head of ICT at NHS City & Hackney, on ISO 27000 compliance
-
Input from the business vital to risk management in infosec, says CISO for Steria UK

0 comments
Oldest Newest